Oct 15, 2014
04/07/2023 2
CONTENTS:-
ABSTRACT EXISTING SYSTEM PROPOSED SYSTEM SRS DOCUMENT HARDWARE REQUIREMENTS SOFTWARE REQUIREMENTSDESIGN PHASE REFERENCES
Abstract
Visual Cryptography (VC) is a method of encrypting a secret image into some shares (transparencies) such that stacking a sufficient number of shares reveals the secret image and any qualified subset of the shares can recover the secret “visually”.
The first visual cryptographic technique was pioneered by Moni Naor and Adi Shamir. It involved breaking up the image into n shares so that only someone with all n shares could decrypt the image by overlaying each of the shares over each other.
Practically, this can be done by printing each share on a separate transparency and then placing all of the transparencies on top of each other.
Visual secret sharing (VSS) schemes are used to protect the visual secret.
This scheme can be easily implemented on basis of a black & white VSS scheme and get much better block length.
EXISTING SYSTEM
In Previous methods it show good results for black and white or gray scale VC schemes.
It is not sufficient to be applied directly to color shares due to different color structures.
color visual cryptography are not satisfactory in terms of producing either meaningless shares or meaningful shares with low visual quality, leading to suspicion of encryption.
To avoid this the concept of visual information pixel (VIP) synchronization and error diffusion are introduced to attain a color visual cryptography encryption
PROPOSED SYSTEM
In proposed system visual cryptography technique, to provide privacy protection when transmitting sensitive data between offices or computers.
Here visual information pixel (VIP) synchronization and error diffusion to attain a color visual cryptography encryption method that produces meaningful color shares with high visual quality.
VIP synchronization retains the positions of pixels carrying visual information of original images throughout the color channels and error diffusion generates shares pleasant to human eyes.
Cost will be decreased
MODULE DESCRIPTION:
USER INTERFACE
ENCRYPTION
DECRYPTION
SRS DOcument :HARD WARE Requirements :
Processor : Pentium III
RAM : 128 MB / 256 MB (Recommended)
Hard disk : 20 GB
Operating System: Win 9x/ XP
Programming Tool : Java 1.4.2
SOFTWARE Requirements :
FUNCTIONAL Requirements :
INPUT: Encripting an image is done by giving receivers port number OUTPUT: Decripting an image is done through the senders port number
nON FUNCTIONAL Requirements : •Usability
•Reliability
•Performance
•Supportability
•Throughput
Efficiency
Security
04/07/2023 14
Design phase
USE CASE Diagram.CLASS Diagram.ACTIVITY Diagram.SEQUENCE DiagramCOLLABORATION Diagram.STATE CHART Diagram.
Use case diagram
04/07/2023
15
select image to send
select two cover images
select ip and port number
encrypt
Sender
send
receive
receiver
decrypt
Class diagram:-
Receiver
nameipaddressportnumber
selectip()selectportnumber()receiveimage()decrypt()
Sender
nameipaddressportnumber
selectimages()selectip()selectportnumber()encrypt()send()
Activity diagram:-
Select image to send
Select two cover images
select ip and port number
encrypt
valid ip
Errorinvalid
receive
Send
decrypt
ReceiverSender
SEQUENCE diagram:-s : Sender r : Receiver
select image to be hide
select two cover images
select ip address
select port number
encrypt
send
receive image
enter ip and port
decrypt
COLLABORATION phase
s : Sender r : Receiver
1: select image to be hide2: select two cover images
3: select ip address4: select port number
5: encrypt
6: send
7: receive image8: enter ip and port
9: decrypt
STATE CHART phase:active
select image to send
select two cover images
select ip and port number
encrypt
send
receive
decrypt
select image to send
select two cover images
select ip and port number
encrypt
send
receive
decrypt
04/07/2023 21
references
M. Naor and A. Shamir, “Visual cryptography,” in Proc. EUROCRYPT, 1994, pp. 1–12.
G. Ateniese, C. Blundo, A. D. Santis, and D. R. Stinson, “Visual cryptography for general access structures,” Inf. Comput., vol. 129, no.
A. Houmansadr and S. Ghaemmaghami, “A novel video watermarking
method using visual cryptography,” in Proc. IEEE Int. Conf. Eng. Intell. Syst., 2006, pp.
M. S. Fu and O. C. Au, “Joint visual cryptography and watermarking ,” in Proc. IEEE Int. Conf. Multimedia Expo, 2004, pp. 975–978.
04/07/2023 22
Queries….?
THANK YOU